It focuses on the process of collecting and evaluating evidence to determine whether a computer system safeguards assets, maintains data integrity, and allows organizational goals to be achieved ...